11-29-2008
You will need bootable media that was used to install the os or that came with the os. The problem you will have is that your file system may not be readable by any other os. Attaching the HD to another box might be worth a try though. If you get access to shadow file, you will be able to read and write to it. Just remove the encrypted password. Or copy the encrypted password from the account whose password you know. If you give JtR, say, 500 passwords, it can quickly break a few most of the time. But if your root password is a good one, it can take many weeks.
Can't the guy who sold you the system tell you the password?
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
My root password for mysql has some problem as it dosent allow me to login....
all commands to reset it failed. so I removed mysql
yum remove mysql
and installed it by
yum install mysql mysql-devel mysql-server
and it installed fine
I gave chkconfig --levels 235 mysqld on... (1 Reply)
Discussion started by: viji19812001
1 Replies
2. UNIX for Advanced & Expert Users
How to change the ldap root password.
I have generated the password by using "slappasswd " command, but In my root machine "/etc/ldap/sldap.d" file is not there. instead of the file sldap.d directory only is there. please help me...? (0 Replies)
Discussion started by: ungalnanban
0 Replies
3. Red Hat
I need some help with Fedora. I am trying to reset the root password. When I tried to login I was not able to. I kept getting the authentication failure message. I got the password reset success message.
passwd: all authentication tokens updated successfully.
I then thought maybe the root... (6 Replies)
Discussion started by: cokedude
6 Replies
4. Emergency UNIX and Linux Support
Hi All,
I'm stuck in a severe problem here , Someone have changed the root password
and he cannot remember it and there is no other user privileged user on the system , But I do have access to a non privileged user.
On the top of the system an application which requires a theoretical ... (5 Replies)
Discussion started by: h@foorsa.biz
5 Replies
5. Solaris
Hello, I have two old Solaris machines
$ uname -a
SunOS unknown 5.8 Generic_117350-39 sun4u sparc SUNW,UltraAX-e2
unfortunately, it has been so long ago that i have used these that the root password has left my head...
i can log into one of the machine as a normal user, but am unable to... (4 Replies)
Discussion started by: Norman Khine
4 Replies
6. Solaris
Hi All,
I just found one thread on this forum on this subject here:
Forgot MYSQL password root | Unix Linux Forums | Web Development
but unfortunately the issue was not resolved.
I have the same problem with the same error message.
The background is that I built a Solaris 11 x86 server... (11 Replies)
Discussion started by: hicksd8
11 Replies
7. UNIX for Advanced & Expert Users
we have NCR 3455 system from long time as attached all information for server (images) , so we need your help to assist us to get root password which lost it , really we appreciate your efforts if you can send us the procedure for resting the administrator (root) password which this server... (0 Replies)
Discussion started by: univoip
0 Replies
8. UNIX for Beginners Questions & Answers
Hi ,
I ve a question about the Linux system root password change.
Which can be done using grub menu without inputting the old password.:confused:
So If anybody can change the root password without any password and then how it is secure. Anybody can manipulate the other user using the... (6 Replies)
Discussion started by: pradyumnajpn10
6 Replies
LEARN ABOUT CENTOS
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when an user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with a exclamation mark means that the password is locked. The remaining characters on the line represent
the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.1.5.1 05/25/2012 GSHADOW(5)